top of page
< Back

5GS Data Architecture : UDM, UDR and UDSF

Duration : 3 days

Objectives : Introduce 5G network functions related to data model, in particular UDM, UDR, AUSF and UDSF

Who should attend : Telecommunications engineer, Telecommunications consultant, Telecommunications architect

Prerequisites : Minimum knowledge of HSS in the 4G context

Course outline :
The goal of this training is to:
1. introduce the HSS interfaces to better understand its evolution towards 5G,
2. describe the service-based interfaces related to network functions which handle the data model in 5GS, in particular, UDM, UDR and UDSF
3. present the call flows involving these network functions to understand their service-based interface.
4. Present the interworking between HSS and UDM when the EPS and 5GS UDRs are separate databases.

1. HSS interfaces
1.1. S6a/S6d
1.2. S6c
1.3. S6t
1.4. SWx
1.5. Cx
1.6. Sh
1.7. Call flows for understanding these interfaces
1.7.1. Attachment/detachment in the EPS context (S6a)
1.7.2. Attachment/detachment in the WLAN connected to the ePC context (SWx)
1.7.3. Registration/deregistration in IMS context (Cx, Sh)
1.7.4. Sending/Receiving SMS in the EPS context (S6c)
1.7.5. Subscription/Notification to events in the LTE-M/NB-IoT context (S6t)
1.7.6. NIDD Authorization in NB-IoT context (S6t)
1.7.7. Configuring application settings in the LTE-M/NB-IoT context

2. Introduction to 5GC
2.1. Service-Based Architecture
2.2. Principles of network slices
2.3. NFs (Network Functions) of the 5GC
2.4. Discovery of NFs instances via the NRF
2.5. Principles of NF Services associated with NF service-based interfaces

3. Nudm service-based interface associated with UDM network function
3.1. NF services associated with the Nudm service-based interface of the UDM
3.1.1. Nudm_UEContextManagement (Nudm_uecm)
3.1.2. Nudm_SubscriberDataManagement (Nudm_sdm)
3.1.3. Nudm_UEAuthentication Service (Nudm_ueau)
3.1.4. Nudm_EventExposure Service (Nudm_ee)
3.1.5. Nudm_ParameterProvision Service (Nudm_pp)
3.1.6. Nudm_NIDDAuthorization Service (nudm-niddau)
3.1.7. Numd_MobileTerminated Service (Nudm_mt)
3.1.8. Explicit notifications versus implicit notifications
3.2. Call flows for understanding the Nudm service-based interface
3.2.1. Registration
3.2.2. Change of tracking Area and re-registration
3.2.3. Deregistration
3.2.4. Relocation of AMF
3.2.5. PDU session establishment
3.2.6. Subscription/Notification to events
3.2.7. NIDD authorization in mMTC context
3.2.8. Configuring application settings

4. Nausf interface associated with AUSF network function
4.1. 5G authentication architecture
4.1.1. ARPF
4.1.2. AUSF
4.1.3. SEAF
4.1.4. SIDF
4.1.5. Third-party authentication center
4.2. Non-3GPP authentication procedure
4.3. 3GPP authentication procedure
4.4. Nausf service-based interface
4.5. Mapping between Nausf and Nudm interfaces for the authentication procedure
4.6. Difference Between LTE Authentication and 5G Authentication

5. Nudr interface associated with 5G UDR network function
5.1. Nudr service-based interface
5.2. Data stored in 5G UDR
5.2.1. Subscription data
5.2.1.1. Authentication data
5.2.1.2. UE-Context data
5.2.1.3. provisioned data
5.2.1.4. Shared data
5.2.1.5. Group data
5.2.2. Policy Data
5.2.2.1. AM policy data
5.2.2.2. EU policy data
5.2.2.3. SM policy data
5.2.2.4. Background data transfer policy data
5.2.3. Structured data exposed to internal network functions
5.2.3.1. Access and mobility data
5.2.3.2. Session management data
5.2.4. Application data
5.2.4.1. Packet flow descriptor data
5.2.4.2. Data influence
5.3. Clients of the Nudr service-based interface : UDM, PCF and NEF
5.4. Call flows for understanding interactions with the 5G UDR

6. Nudsf service-based interface associated with UDSF network function
6.1. Nudsf Service-based Interface
6.2. Data stored in UDSF
6.3. Call flows for understanding interactions with UDSF

7. Interworking between HSS and UDM if UDR EPS and UDR 5GS are separate (UDICOM)
7.1. HSS/UDM interworking architecture
7.2. Interworking procedures
7.2.1. Authentication procedure
7.2.2. 5G to 4G and 4G to 5G mobility procedures
7.2.3. T-ADS procedure
7.2.4. Procedure for receiving SMS
7.2.5. P-CSCF restoration procedure

bottom of page